Abstract
Abs Companies have substituted paper based systems with IT systems, such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system. We should focus our attention on discovering sensitive information, in a database server, since the majority of corporations use DBMS. However, concealment is difficult to observe and detect, because perpetrators do their best to hide their illegal activities. In particular, we need to consider the case of a covert database server. This paper proposes methodologies to detect covert database servers that would be helpful to forensic investigators. Therefore, we describe an example of a covert database server and suggest several detection, techniques. Finally, we provide an investigation scenario that applies our methodology in the real world.
Original language | English |
---|---|
Pages (from-to) | 1313-1324 |
Number of pages | 12 |
Journal | International Journal of Innovative Computing, Information and Control |
Volume | 6 |
Issue number | 3 |
Publication status | Published - 2010 Mar |
Keywords
- Database
- Digital forensic
- Hiding
- Network searching
ASJC Scopus subject areas
- Software
- Theoretical Computer Science
- Information Systems
- Computational Theory and Mathematics